Recent versions of the mobile application for Yahoo’s popular fantasy football service are vulnerable to a session hijack attack.
Browsing Category: Uncategorized
One day after the New York Times Web site was offline for several hours due to what experts speculated was an attack, the site of the Washington Post was hacked, apparently by the Syrian Electronic Army. Officials at the Post said that the attack followed closely on the heels of the SEA hacking the Twitter account of one of its employees.
Scenes from this year’s hacking conference in Las Vegas, Nev. include a keynote by General Keith B. Alexander, Director of the National Security Agency and talks by researchers Karsten Nohl and Ralf-Phillip Weinmann.
Las Vegas – In the last Black Hat briefing of the day Wednesday, German security researcher Karsten Nohl of Security Research Labs demonstrated a SIM card attack that exploited sloppy encryption and gave the researcher root access to a type of SIM card built into billions of mobile devices.
A 213-foot luxury yacht veered off course while cruising in the Mediterranean Sea this summer after a radio navigation research team led by global positioning systems expert Todd Humphreys of the University of Texas Austin built a custom-made device capable of overriding the ship’s GPS receivers with spoofed signals.
Barnaby Jack always seemed to find a way to make the process of banging away on an application–or a pacemaker or an ATM–look like the most fun anyone has ever had. And he wanted all of his friends to join in the fun. Jack, a respected and much-admired security researcher at IOActive, died on July 25 in San Francisco, just a few days before Black Hat, the conference that played host to some of his more memorable demonstrations.
A tool, PinkStats, has been used by a number of Chinese attack crews in targeted operations against governments, universities and other organizations over the last four years.
Join Paul Roberts, Threatpost editor, and his guests, Michael Guigli, CEO of CloudConnect and Tim Armstrong, Malware Researcher at Kaspersky Lab as they discuss Virtualization and the security challenges faced by small businesses.
Join Dennis Fisher, Threatpost editor-in-chief, and his guests, Josh Corman, Director Security Intelligence Akamai, and Gene Kim, Founder / Former CTO Tripwire, and Author, “Visible Ops,” as they discuss the changing threat landscape and how technology plays a pivotal role in the security challenges facing businesses today.
This advice can be extended to general online activity, not just social
networks, and most importantly, not just Twitter. You should care at
least as much for the security of your e-mail account, especially if it
was used to register your Twitter or Facebook accounts. Basically, a
compromised email account opens op new ways for the bad guys to get into
your other accounts: the password reset function usually sends a link
to your email address for confirmation.